Apply machine learning techniques to detect malicious network traffic in cloud computing
Abstract Computer networks target several kinds of attacks every hour and day; they evolved to make significant risks. They pass new attacks and trends; these attacks target every open port available on the network. Several tools are designed for this purpose, such as mapping networks and vulnerabil...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2021-06-01
|
Series: | Journal of Big Data |
Subjects: | |
Online Access: | https://doi.org/10.1186/s40537-021-00475-1 |
id |
doaj-a8ef299d8c9f4bc1b0888f847b88fc00 |
---|---|
record_format |
Article |
spelling |
doaj-a8ef299d8c9f4bc1b0888f847b88fc002021-06-20T11:50:05ZengSpringerOpenJournal of Big Data2196-11152021-06-018112410.1186/s40537-021-00475-1Apply machine learning techniques to detect malicious network traffic in cloud computingAmirah Alshammari0Abdulaziz Aldribi1Department of Computer Science, College of Computer, Jouf UniversityDepartment of Computer Science, College of Computer, Qassim UniversityAbstract Computer networks target several kinds of attacks every hour and day; they evolved to make significant risks. They pass new attacks and trends; these attacks target every open port available on the network. Several tools are designed for this purpose, such as mapping networks and vulnerabilities scanning. Recently, machine learning (ML) is a widespread technique offered to feed the Intrusion Detection System (IDS) to detect malicious network traffic. The core of ML models’ detection efficiency relies on the dataset’s quality to train the model. This research proposes a detection framework with an ML model for feeding IDS to detect network traffic anomalies. This detection model uses a dataset constructed from malicious and normal traffic. This research’s significant challenges are the extracted features used to train the ML model about various attacks to distinguish whether it is an anomaly or regular traffic. The dataset ISOT-CID network traffic part uses for the training ML model. We added some significant column features, and we approved that feature supports the ML model in the training phase. The ISOT-CID dataset traffic part contains two types of features, the first extracted from network traffic flow, and the others computed in specific interval time. We also presented a novel column feature added to the dataset and approved that it increases the detection quality. This feature is depending on the rambling packet payload length in the traffic flow. Our presented results and experiment produced by this research are significant and encourage other researchers and us to expand the work as future work.https://doi.org/10.1186/s40537-021-00475-1IDSNetwork trafficFeature extractionDatasetMachine learning |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Amirah Alshammari Abdulaziz Aldribi |
spellingShingle |
Amirah Alshammari Abdulaziz Aldribi Apply machine learning techniques to detect malicious network traffic in cloud computing Journal of Big Data IDS Network traffic Feature extraction Dataset Machine learning |
author_facet |
Amirah Alshammari Abdulaziz Aldribi |
author_sort |
Amirah Alshammari |
title |
Apply machine learning techniques to detect malicious network traffic in cloud computing |
title_short |
Apply machine learning techniques to detect malicious network traffic in cloud computing |
title_full |
Apply machine learning techniques to detect malicious network traffic in cloud computing |
title_fullStr |
Apply machine learning techniques to detect malicious network traffic in cloud computing |
title_full_unstemmed |
Apply machine learning techniques to detect malicious network traffic in cloud computing |
title_sort |
apply machine learning techniques to detect malicious network traffic in cloud computing |
publisher |
SpringerOpen |
series |
Journal of Big Data |
issn |
2196-1115 |
publishDate |
2021-06-01 |
description |
Abstract Computer networks target several kinds of attacks every hour and day; they evolved to make significant risks. They pass new attacks and trends; these attacks target every open port available on the network. Several tools are designed for this purpose, such as mapping networks and vulnerabilities scanning. Recently, machine learning (ML) is a widespread technique offered to feed the Intrusion Detection System (IDS) to detect malicious network traffic. The core of ML models’ detection efficiency relies on the dataset’s quality to train the model. This research proposes a detection framework with an ML model for feeding IDS to detect network traffic anomalies. This detection model uses a dataset constructed from malicious and normal traffic. This research’s significant challenges are the extracted features used to train the ML model about various attacks to distinguish whether it is an anomaly or regular traffic. The dataset ISOT-CID network traffic part uses for the training ML model. We added some significant column features, and we approved that feature supports the ML model in the training phase. The ISOT-CID dataset traffic part contains two types of features, the first extracted from network traffic flow, and the others computed in specific interval time. We also presented a novel column feature added to the dataset and approved that it increases the detection quality. This feature is depending on the rambling packet payload length in the traffic flow. Our presented results and experiment produced by this research are significant and encourage other researchers and us to expand the work as future work. |
topic |
IDS Network traffic Feature extraction Dataset Machine learning |
url |
https://doi.org/10.1186/s40537-021-00475-1 |
work_keys_str_mv |
AT amirahalshammari applymachinelearningtechniquestodetectmaliciousnetworktrafficincloudcomputing AT abdulazizaldribi applymachinelearningtechniquestodetectmaliciousnetworktrafficincloudcomputing |
_version_ |
1721369645312638976 |